Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Objectives

Design and plan the implementation of a web architecture to support the online presence of a newspaper company. The design must include diagram(s) of the network and web architecture and have installation and configuration instructions for each of the servers and features identified in the instructions below.

A template for the Course Project report is available in Doc Sharing.

Background

Because of the explosion in digital news sources, the DeVry Daily News and the DeVry Tribune have decided to merge their newspaper businesses in order to better defend against this online assault. They plan to co-locate their business and news offices in a single building where they also plan to establish a strong digital news presence. The new business is called the DeVry Daily Tribune (DDT) and has the domain www.ddt.edu.

The business has hired us-WEB375 Consulting-to design a secure and robust web architecture for its new facility. Our contract requires us to deliver a diagram of the web architecture plan and instructions that their system administrator can use to set up each of the servers they need. Luckily for us, DDT has chosen to go with Linux, which is our specialty, as the core operating system for its servers.

The following are the core requirements for the web architecture.

  • Electronic mail for DDT's 100 employees. Employees in the building (on the LAN) can access their e-mail with any e-mail client, but employees off-site must use a web-based e-mail client.
  • Secure FTP for the company and freelance photographers to upload digital images wherever they happen to be photographing the story. All photographers should upload digital images to their own individual directories and not have access to other user photos.
  • Anonymous FTP for the public to download selected royalty-free or creative commons photos that the newspaper decides to make available. This may be hosted on a different machine from the secure FTP server.
  • A dynamic new website supported by a LAMP architecture. Reporters will be able to write and submit their news stories through the web interface, which will save the stories in the database. The web application will present these stories to users when they visit the website.
  • The newspaper already has the PHP web application developed; we just need to design and develop instructions for the installation of the web server and database server to support the application.
  • A DHCP server on the local network to distribute IP addresses. DDT leaders do not want to use a router-based solution, but instead want the ability to configure their own computer-based DHCP server.
  • A local DNS service to speed name resolution for web access.

The DeVry Daily Tribune plans to try several innovative web-based digital initiatives in the next year in order to reassert itself in the news marketplace. The company is very security conscious because it wants to keep these initiatives secret until they are ready. Once its web technologies are deployed, its does not want the website or its data breached.

The company wants as few services exposed to the Internet as possible, and each server should have a local firewall installed that only permits access to services installed on the server and SSH for remote access.

You only need to provide a design and instructions that explain the steps required to install and configure the web architecture you are recommending. You do not need to install and configure these servers on a VM, though it may help you in testing and refining your instructions.

Task Details and Recommended Milestone Dates

Download the Course Project Template document in Doc Sharing and complete each deliverable section using the information below. You should write the instructions and create diagrams that a system administrator with your level of knowledge and experience could follow. When describing installation and configuration steps, describe the process in a manner a classmate could follow to perform the work.

The Course Project is due Week 8 of the course, but you should work on it each week. To help plan your time, the task details for each section include a recommended week to complete that section's instructions.

Introduction

Recommended Completion: Week 1 

Give background on the project and explain the design approach you are taking to the web architecture. This section should be expanded after completing the design diagrams in Week 2.

Linux Administrator Account Set-Up

Recommended Completion: Week 1 

Take steps to create the primary Linux system admin account: a..n@ddt.edu. Even though this activity will be performed on each of the servers in the web architecture, you only need to describe the steps once.

Network and Web Architecture Design

Recommended Completion: Week 2

Create a diagram of the network and web architecture you are proposing. The diagram should be similar to those in the lectures. You should document your design by explaining why you decided on the proposed web architecture. For example, make decisions on whether or not to use Bastion hosts, single servers, DMZs, and so on.

Mail Server Installation and Configuration

Recommended Completion: Week 3 

Take steps to install and configure the mail server. The mail server should not relay mail from other servers. Mail user accounts correspond to Linux user accounts. Therefore, on this machine, you need to establish a user account for every employee. Your directions should explain how to set up one sample account and describe items to keep in mind as the administrator sets up the other accounts. The only virtual user account for mail is mapping w..r@ddt.net to the admin user account defined above.

Anonymous FTP Server Installation and Configuration

Recommended Completion: Week 4 

Take steps to install and configure an anonymous FTP server. The anonymous FTP server resides at ftp.ddt.edu and is available to anyone in the world. As is common practice, the top-level folder is at /var/pub on the server workstation. Because it is an anonymous server, users do not need to log in, but anonymous users can only download files. The admin account (admin), should have full rights to the server to upload photos and manage file and directory organization.

Secured FTP Server Installation and Configuration

Recommended Completion: Week 4 

Take steps to install and configure the secure FTP server. You may decide to make this server the same workstation and the anonymous FTP server, or it may be a different machine. In either case, the secure FTP server must limit users to one directory hierarchy (chroot jail). Each FTP user will also have a Linux user account on the server workstation. The admin account (admin), should have full rights to the server to organize all photos and manage the file and directories.

Web Server Installation and Configuration

Recommended Completion: Week 5 

Take steps to install and configure the web server (Apache). The ServerAdmin should be w..r@ddt.edu, and for security purposes, the directory for the DocumentRoot should be at /var/www/ddt. Because the newspaper will have reporters connecting from all over the world-often with intermittent Internet connections-we want the connection parameters set to the following.

  • Timeout      120
  • KeepAlive    On
  • MaxKeepAliveRequests    500
  • KeepAliveTimeout        120

They also want to set up virtual hosting for the previous websites of the two companies.

www.devrydaily.com and www.devrytribune.com

Database Server Installation and Configuration

Recommended Completion: Week 6 

Take steps to install and configure the MySQL server. The firewall on the MySQL server workstation should only the root user to log in from the localhost. The root account must have a password. Explain how to create a database, ddttest, to test the server with a single table, ddtusers. The table should have columns for username, firstname, lastname, and e-mail. Add five records to the table for testing purposes.

Firewall Installation and Configuration

Recommended Completion: Week 7 

Take steps to install and configure the firewall (iptables) on the web server. The workstation that hosts the web server may host other services; that is your decision. The firewall on the web server should only allow incoming traffic for the services hosted on the workstation and should deny all other traffic.

DHCP Server Installation and Configuration

Recommended Completion: Week 7

Steps to configure the DHCP server. The DHCP server should

  • distribute IP addresses to anonymous clients in the range 10.3.75.0 through 10.3.75.255 with a 6 hours lease time;
  • ensure the primary DNS is 203.0.113.1 and the secondary DNS is 203.0.113.2;
  • ensure the subnet mask is 255.255.255.0; and
  • give each server workstation a host name and set up the DHCP server to give a fixed IP address to that workstation. For example, the web server workstation could be named "ddt_web" and assigned the IP address 203.0.113.15 and the FTP server. If it is on a different workstation, it may be "ddt_ftp" and assigned 203.0.113.10.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92084785
  • Price:- $35

Priced at Now at $35, Verified Solution

Have any Question? 


Related Questions in Computer Engineering

Question shuffling a linked list design a divide and

Question : Shuffling a linked list. Design a divide and conquer algorithm that randomly shuffles a linked list in O(nlog(n)) time and logarithmic extra space. The response must be typed, single spaced, must be in times n ...

Question suppose a node is on the same lan as 973939166

Question : Suppose a node is on the same LAN as 97.39.39.166 needs 97.39.39.166's MAC address. What would the destination address of the ARP query be (link layer)? The response must be typed, single spaced, must be in ti ...

Using a telephone survey of 400 randomly selected

Using a telephone survey of 400 randomly selected registered voters, he solicits both their party identification and whether or not they had read the newspaper that day. The results are displayed in the following cross-t ...

Can someone help me identify how intrustion detection

Can someone help me identify how Intrustion detection system and intrusion prevent system can help protect confidentiality, integrity and availability.

Identify at least two 2 factors that have led to the

Identify at least two (2) factors that have led to the explosive growth of digital crime over the past a few decades. Next, describe the most common forms of digital crime, and give your opinion as to why those forms you ...

With regards to data mining business analytics why is it

With regards to data mining/ business analytics, Why is it not ideal to evaluate a classifier's performance on the training data set?

We have a scheme program belowdefine lst i think you like

We have a Scheme program below: (define lst '(I (think you) like me)) (set! lst (cdr lst)) (set-car! lst '(thinks you)) (set! lst (cons 'he (cons 'also lst))) (a) For each execution step of the above program, draw the me ...

Assignment 2 windows 8 upgradeby the due date assigned

Assignment 2: Windows 8 Upgrade By the due date assigned, submit your assignment to the Submissions Area. Scenario: You are a consultant for a company that is using Windows 7 as their operating system and are considering ...

Answer the following question research management in a

Answer the following Question : Research management in a field and compare it with the field in software. Compare the management techniques with that field you chose to software project management. The response must be t ...

Software engineeringeach of the following heuristics helps

Software Engineering: Each of the following heuristics helps make a good module according to some modularity principle. Identify the principle for each letter. Modularity principles: Principle of Small Modules Principle ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As